• To think exaltation reading comprehension ability want to be malicious to grasp a basic achievement first, commit to memory a list a phrase, extension oneself of vocabulary quantity.

    提高阅读理解能力首先狠抓基本功,熟记单词,扩大自己词汇

    youdao

  • While restricting web surfing to trusted sites should reduce the risk of infection, the malicious code can be injected into any website.

    尽管限制浏览器只浏览信任站点可以减少受到攻击风险恶意代码可以植入任何的网站。

    youdao

  • They could be targeted by a hacker who could takes steps, including sending malicious software in an email, that appears to come from someone the victim knows.

    他们可能成为黑客的攻击目标。攻击手段包括伪装成受害者认识通过电子邮件向其发送恶意软件

    youdao

  • But compensation shall be made for malicious damage caused to another person by a trademark registrant.

    但是,因商标注册人恶意他人造成损失的,应当予以赔偿

    youdao

  • Be sure to think outside the box and consider any tools that malicious users may employ to penetrate your security.

    确保摆脱思维束缚,考虑恶意用户可能采用渗透安全层的任何工具

    youdao

  • Wealthy investors from almost every industry, from finance to Hollywood, are terrified that the next money manager they choose might turn out to be nothing more than a malicious conman.

    各行各业的投资者,不论是金融业还是好莱坞害怕自己所选择理财人可能就是恶毒骗子

    youdao

  • This would be a big mistake; it would allow malicious users to inject code that would be executed on your server.

    这样使恶意用户乘机注入服务器执行代码

    youdao

  • Both types of entities might be used to create denial of service attacks or other malicious documents when used with a Web browser's rendering engine.

    这两种类型实体Web浏览器呈现引擎一起使用时,可能用于创建拒绝服务攻击其他恶意文档

    youdao

  • Torpig is a type of malicious software called a Trojan that hides in infected computers, allowing them to be controlled remotely.

    Torpig一种称为“特洛伊木马”恶意软件隐藏受感染电脑中。

    youdao

  • Laughter can be used to show who is boss and malicious laughter is an effective weapon of intimidation.

    可以用来表示才是老大恶意的笑也可以成为恐吓的有力武器。

    youdao

  • For example, once a malicious party has somehow stolen a legitimate message created by a sender, the message could be forwarded to anyone.

    例如一旦恶意的一以某种方式窃取发送方创建合法消息消息有可能被转发给任何人。

    youdao

  • Still, deviations can be used in other scenarios than just to detect fraud or malicious manipulation.

    除了检测欺诈行为恶意操纵外偏差可以用于其他一些场景

    youdao

  • For every server, there must be a client — and that client can be susceptible to attacks by a malicious server.

    每个服务器必须一个客户——客户端容易恶意服务器进行攻击

    youdao

  • If anyone were to remove the casing in a malicious attempt to remove components, the appliance is disabled and must be sent back to IBM to be reset before it can be used again.

    如果任何人恶意地去掉外壳移除其中的组件那么设备将被禁用必须送回IBM进行重置,这样能够再次使用

    youdao

  • Several security enhancements are included, from closing script vulnerabilities to phishing protection, but most of them won't affect your work unless you happen to be writing malicious code.

    包括若干安全增强,例如关闭脚本漏洞欺骗保护。而且,大部分增强不会影响工作除非正打算编写恶意代码。

    youdao

  • If a malicious user can overwrite the buffer, then the value of the flag can be changed, thus providing the attacker with illegal access to private files.

    如果不怀好意使用者缓冲区变更标志从而指出攻击者是非法存取专用文件。

    youdao

  • If the application has XSS holes, the attacker may send a malicious script that can still be executed by the application and lead to XSS intrusions.

    如果应用程序xss漏洞攻击者就可能会发送应用程序执行恶意脚本导致XSS侵入

    youdao

  • You can be exposed to attackers through a malicious fake website, or even through a familiar website that has been hacked.

    访问恶意假冒网站甚至入侵的熟悉网站,都会暴露在黑客的眼中。

    youdao

  • There doesn’t have to be anything malicious about it (although there might be). It’s the inevitable result of giving the boss the subjective power to define and judge another’s performance.

    并不一定存在任何恶意揣测(虽然可能存在),若了管理层这样主观权力定义或者评价其他人的工作表现的话,这样的情形就将会是必然结果

    youdao

  • Alternately, a malicious sender may be able to claim that it has sent a message only once even though it has actually sent the message more than one time.

    反过来说恶意发送可能声称发送消息即使事实上发送了不止

    youdao

  • It's evidence that people will be malicious and try to compromise peoples' health using computers, especially if neural devices become more widespread.

    明显,会有人存心不良电脑危机别人健康尤其神经装置更加普及时

    youdao

  • Malicious code can be hidden in fonts that automatically load when a user opens a PDF file, allowing a hacker to take control of the device.

    恶意代码可以隐藏字体中用户打开PD F文档自动加载从而允许黑客完全控制手机

    youdao

  • There doesn't have to be anything malicious about it (although there might be). It's the inevitable result of giving the boss the subjective power to define and judge another's performance.

    并不一定存在任何恶意揣测(虽然可能存在),若了管理层这样主观权力定义或者评价其他人工作表现的话,这样的情形就将会是必然结果

    youdao

  • The term attacker can be used to describe a malicious hacker.

    词汇攻击者可用描述恶意黑客

    youdao

  • Yes, it seems that to get the malicious code working, a user would still need to be surfing with IE.

    是的似乎如果恶意代码生效,用户还是使用IE浏览器

    youdao

  • The data levels or categories can be set up arbitrarily, but typically they group data according to the level of damage that would occur if the data is accessed by someone with malicious intent.

    数据级别分类任意设置通常根据恶意用户访问数据造成破坏程度分组的。

    youdao

  • It would be possible for someone to maliciously corrupt the counter property via an unprotected update, but that same malicious party could do the same thing with a normal update cycle.

    可能有人恶意地通过保护更新破坏计数器属性这种破坏可以发生常规更新中。

    youdao

  • In this following example, taken from the Microsoft blog, a malicious program (circled in red) is pretending to be the safe option (circled in green) of viewing and opening files.

    下面这个例子里(取自Microsoft博客),恶意程序()假装某一安全查看打开文件选项(绿圈)。

    youdao

  • This statement is vulnerable to SQL injection - quotes in $_GET['username'] are not escaped and will be concatenated as part of the statement text, which can result in malicious behavior.

    语句容易受到SQL注入的威胁 —— $_GET['username'] 中的引号没有转义,因此加入到语句文本中,这样可以导致恶意的行为。

    youdao

  • This statement is vulnerable to SQL injection - quotes in $_GET['username'] are not escaped and will be concatenated as part of the statement text, which can result in malicious behavior.

    语句容易受到SQL注入的威胁 —— $_GET['username'] 中的引号没有转义,因此加入到语句文本中,这样可以导致恶意的行为。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定